Which system is primarily employed to collect, normalize, and analyze log data from various sources to detect anomalies, provide alerts, and enable compliance reporting?
Security Information and Event Management system
Network Intrusion Detection System
Simple Network Management Protocol trap
Virus and malware removal software